5 research outputs found

    Defense-through-Deception Network Security Model: Securing University Campus Network from DOS/DDOS Attack

    Get PDF
    Denial of Service (DOS) and (DDOS) Distributed Denial of Service attacks have become a major security threat to university campus network security since most of the students and teachers prepare online services such as enrolment, grading system, library etc. Therefore, the issue of network security has become a priority to university campus network management. Using online services in university network can be easily compromised. However, traditional security mechanisms approach such as Defense-In-Depth (DID) Model is outdated in today’s complex network and DID Model has been used as a primary cybersecurity defense model in the university campus network today. However, university administration should realize that Defense-In-Depth (DID) are playing an increasingly limited role in DOS/DDoS protection and this paper brings this fact to light. This paper presents that the Defense-In-Depth (DID) is not capable of defending complex and volatile DOS/DDOS attacks effectively. The test results were presented in this study in order to support our claim. The researchers established a Defense-In-Depth (DID) Network model at the Central Luzon State University and penetrated the Network System using DOS/DDOS attack to simulate the real network scenario. This paper also presents the new approach Defense-through-Deception network security model that improves the traditional passive protection by applying deception techniques to them that give insights into the limitations posed by the Defense-In-Depth (DID) Model. Furthermore, this model is designed to prevent an attacker who has already entered the network from doing damage

    An Exploratory Study of Student Persistence and its Relationship with Achievement While Using a Game-based Learning Environment

    No full text
    This study tests the common wisdom that persistence leads to academic success. We explore indicators or markers of persistence exhibited by 60 students from Baguio City, Philippines as they played a game-based learning environment called Physics Playground. The study attempted to determine the extent to which the markers of persistence identified by Shute et al. (2013) – specifically time spent, number of level restarts, and number of level revisits – were related with achievement. When clustered the data into two, according to these features, the clusters only differed significantly in terms of time spent and number of restarts. Number of revisits was not significantly different. What was most interesting, though, was that gold and no-badge outcomes were significantly negatively correlated with time spent and significantly positively correlated with number of restarts. These findings imply Shute’s markers while possibly indicative of persistence may also be indicative of non-learning behaviors, most notably wheel spinning

    Wheel-spinning in a game-based learning environment for physics

    No full text
    We study wheel-spinning behavior among students using an educational game for physics. We attempted to determine whether students wheel-spin, and to build a wheel-spinning detector. We found that about 30 to 40 % of students are unable to successfully complete a level when attempting it 8 times or more, or when working on it for more than 160 s. We also found that past performance is predictive of wheel-spinning, and that persistence increases both the likelihood of success and of wheel-spinning. Finally, we found that wheel-spinning in this context is different from wheel-spinning exhibited in prior work in that it is relatively easy to detect and does not suffer from cold starts

    More Fun in the Philippines? Factors Affecting Transfer of Western Field Methods to One Developing World Context.

    No full text
    This paper presents some of the challenges encountered by a field research team when deploying an educational game for Physics. These included problems with site infrastructure and institutional support, logistical challenges, compliance with ethics requirements, launch delays, and student inattention or misunderstanding of directions. The paper shares these experiences with the wider community to help fellow researchers prepare, should they decide to conduct field studies in the Philippines
    corecore